Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe
-
Size
494KB
-
MD5
5ce5038ff3f2ba3479658491fef3db67
-
SHA1
47d2f5482759b1c69901fb54f12f787c3ee0189d
-
SHA256
13672defb59111e2060bb24ce7fd53e176dcabb4b298fe2d4392d3e446b6aa9a
-
SHA512
1ae3b597aaee31f4d7ca8153f2b6cf1a21da0bc748ab82d231ff766e9b015d529ce833998a18cadcb52394d2c998cc4eb7000c83fa4160ec48d8230a0198a923
-
SSDEEP
12288:k0eXRPegdJW6qH9Aw8YRyD5O4tZK/UDVZjY:eNRJFqH9T8Yy5jtZK/7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",C:\\Arquivos de programas\\Internet Explorer\\Connection Wizard\\iedw.exe," 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\pluginiedw = "C:\\Arquivos de programas\\Internet Explorer\\Connection Wizard\\iedw.exe" 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2976 sc.exe 2104 sc.exe 2188 sc.exe 2184 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2104 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2104 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2104 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2104 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2188 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 32 PID 2232 wrote to memory of 2188 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 32 PID 2232 wrote to memory of 2188 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 32 PID 2232 wrote to memory of 2188 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 32 PID 2232 wrote to memory of 2184 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2184 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2184 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2184 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 34 PID 2232 wrote to memory of 2976 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 36 PID 2232 wrote to memory of 2976 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 36 PID 2232 wrote to memory of 2976 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 36 PID 2232 wrote to memory of 2976 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 36 PID 2232 wrote to memory of 868 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 38 PID 2232 wrote to memory of 868 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 38 PID 2232 wrote to memory of 868 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 38 PID 2232 wrote to memory of 868 2232 5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ce5038ff3f2ba3479658491fef3db67_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop Alerter2⤵
- Launches sc.exe
PID:2104
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config Alerter start= disabled2⤵
- Launches sc.exe
PID:2188
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop wscsvc2⤵
- Launches sc.exe
PID:2184
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v "BootExecute" /f2⤵PID:868
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2